IP Reachability Differences: Myths and Reali<es

Size: px
Start display at page:

Download "IP Reachability Differences: Myths and Reali<es"

Transcription

1 IP Reachability Differences: Myths and Reali<es Dr. Dan Massey Colorado State University He Yan, Ben Say, Dave Oko, Brendan Sheridan Colorado State University Dr. Christos Papadopoulos Dr. Dan Pei Colorado State University AT&T Research 1

2 Ideally, all ISPs provide you with reachability to same Internet In practice: Different ISPs can reach different portions of the Internet. In other words, there are some prefixes that can be reached via ISP A but cannot be reached by ISP B (a vice versa). The reasons why this occur are well known: Bogon filtering causes reachability differences for newly allocated prefixes. Bogon filtering matters, but the fact is that regional differences matter most and these differences may be political, economic, technical, or a combination of the above Bogon filtering and regional issues matter, but the real difference is due to various customer only services. Even if there are differences, there are very little (if any) production services on networks that are not globally reachable from most ISPs. 2

3 Our Objec<ves 1. Demonstrate reachability differences exist and quan<fy the extent of these differences. 2. Examine which conjectures (if any) provide a significant contribu<on to the differences. 3

4 Methodology Compare BGP Rou<ng Tables from 25 ISPs Data collected from Oregon RouteViews All peers send full tables of over 310K prefixes Studied from April 1 to April 20, 2010 Study Uses ISP0 As a Central Point of View ISP0 is a <er- 1 ISP Have addi<onal data on ISP0 opera<ons Compare each of the other 24 ISPs to ISP0 4

5 Types of Table Differences Exact Matches: ISP0 prefix appears ISPX table Ex: Both ISP0 and ISP2 have a route for /16 Covered Prefixes: ISP0 prefix does not appear in ISPX, but ISPX can reach all IP addresses Less Specific: /17 does not appear in ISPX, but /16 does appear in ISPX More specifics: /17 does not appear in ISPX, but /18 and /18 appear in ISP X Remainder represents poten<al reachability differences. 5

6 Exact Matches Number of Prefixes % of ISP0 prefixes also appear in ISPX ISP Index (not shown here, but 97.25% of ISPX prefixes also appear in ISP0) 04/15/2011 IP Reachability: Myths and Reality 6

7 4500 The BGP Table Differences Number of Prefixes On average, 3250 prefixes appeared in ISP0 tables, but did not appear in ISP22 tables ISP Index 04/15/2011 IP Reachability: Myths and Reality 7

8 Covered Prefixes 7,000 Number of Prefixes 6,000 5,000 4,000 3,000 2,000 Not Covered Covered Nearly all ISP0 prefixes that don t appear in ISPX are covered by other table entries in ISPX 1, ISP Index 04/15/2011 IP Reachability: Myths and Reality 8

9 Overall Reachability Differences 10,000 1,000 (Prefixes) Not Reachable Partially Reachable Number of Prefixes ISP Index 04/15/2011 IP Reachability: Myths and Reality 9

10 Overall Reachability Differences 1e+08 1e+07 (IP Addresses) Number of Destinations (IPs) 1e ,000 10,000 1, ISP Index 04/15/2011 IP Reachability: Myths and Reality 10

11 Our Objec<ves 1. Reachability differences do exist. Small percentage (less than 3%) of total routes. Can be up to 1000 prefixes and millions of IP addresses 2. Examine which conjectures (if any) provide a significant contribu<on to the differences. 11

12 Transient Changes Short Lived BGP Table Differences Fast learners: IPS0 learns the route first, eventually other ISPs catch up and also learn the route Slow to react: ISPX learned the prefix is unreachable, but it takes longer for ISP0 to withdraw the route. Long Term BGP Table Differences. For mul<ple days, ISP0 could reach the prefix but ISPX could not. 12

13 Transient Behaviors 2,500 2,000 1/3 of reachability differences persisted for entire study period. Number of Prefixes 1,500 1, Number of Days Appeared 1/3 of reachability differences are short lived 04/15/2011 IP Reachability: Myths and Reality 13

14 Bogon Routes ISPs Apply Policies to Filter Invalid Routes No universal agreement on what is invalid New Alloca<ons and Bogons Filter unallocated prefixes and update filter ager alloca<on Going back 7 months accounts for 43 prefixes. Going back years yields 295 prefixes. Management Strategies and RADb 92 prefixes with no entry in RADb 199 prefixes with no origin in RADb. Does produce reachability differences, but only explains a small percent of differences. 14

15 Regional Differences 2,500 2, prefixes from India, only unreachable from ISP 22. ISP 22 added these routes on day 13 of study. Number of Prefixes 1,500 1, /15/2011 Number of Days Appeared Bulgaria accounted for most prefixes (509) Great Britain was second highest (168) IP Reachability: Myths and Reality 15

16 Customer Services and Prefix Usage ISPs Provide Specialized Services to Customers Confirmed ISP0 has several such prefixes Most are covered prefixes, but did find some uncovered prefixes Accounts for 9 prefixes in our study. Are Services Running on the Impacted Prefixes? Scanned prefixes looking for common services Limited scan to /19 or more specifics Responding prefixes further checked for DNS entries Contacted Prefix Owners Responses include reports of reachability problems, blacklist issues, network tes<ng, and so forth Valid Global Services Running on Clear Majority of Prefixes 16

17 RouteViews Data in Real- Time 04/15/2011 IP Reachability: Myths and Reality 17

18 Conclusions Reachability Issues Do Exist Over 97% of prefixes appeared as exact matches But differences do occur and impact both research and opera<ons Common Conjectures: Transient issues, Bogons, Management, Regional Policies, Configura<on Errors, Special Services all proposed as explaina<ons All are valid, but none are dominant. 18

19 Ques<ons 19

IP Reachability Differences: Myths and Realities

IP Reachability Differences: Myths and Realities This paper was presented as part of the 14th IEEE Global Internet Symposium (GI) 2011 at IEEE INFOCOM 2011 IP Reachability Differences: Myths and Realities He Yan yanhe@cs.colostate.edu Benjamin Say bsay@cs.colostate.edu

More information

Destination Reachability and BGP Convergence Time. Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA)

Destination Reachability and BGP Convergence Time. Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA) Destination Reachability and BGP Convergence Time Beichuan Zhang (UCLA) Dan Massey (Colorado State) Lixia Zhang (UCLA) Packet Delivery and Routing Dynamics The primary goal of routing is to deliver packets.

More information

6 Watch: Monitoring IPv6 Deployment and Connectivity

6 Watch: Monitoring IPv6 Deployment and Connectivity 6 Watch: Monitoring IPv6 Deployment and Connectivity Dan Massey Colorado State University 1 Many Positive Trends For IPv6 2 Growth in IPv6 ASNs From http://6watch.net/6views.html Data From Colorado Exchange

More information

Investigating occurrence of duplicate updates in BGP announcements

Investigating occurrence of duplicate updates in BGP announcements Investigating occurrence of duplicate updates in BGP announcements Jonathan Park, Dan Jen, Mohit Lab, Shane Amante, Danny McPherson, Lixia Zhang GROW @ IETF75 July 27, 2009 Why This Work All BGP update

More information

Monitoring IPv6 Content Accessibility and Reachability. Contact: R. Guerin University of Pennsylvania

Monitoring IPv6 Content Accessibility and Reachability. Contact: R. Guerin University of Pennsylvania Monitoring IPv6 Content Accessibility and Reachability Contact: R. Guerin (guerin@ee.upenn.edu) University of Pennsylvania Outline Goals and scope So=ware overview Func@onality, performance, and requirements

More information

Rethinking Path Valida/on. Russ White

Rethinking Path Valida/on. Russ White Rethinking Path Valida/on Russ White Reality Check Right now there is no US Government mandate to do anything A mandate in the origin authen9ca9on area is probably immanent A mandate in the path valida9on

More information

Module 14 Transit. Objective: To investigate methods for providing transit services. Prerequisites: Modules 12 and 13, and the Transit Presentation

Module 14 Transit. Objective: To investigate methods for providing transit services. Prerequisites: Modules 12 and 13, and the Transit Presentation ISP Workshop Lab Module 14 Transit Objective: To investigate methods for providing transit services. Prerequisites: Modules 12 and 13, and the Transit Presentation The following will be the common topology

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Stefano Vissicchio UCL Computer Science CS 3035/GZ01 Agenda We study how to route over the Internet 1. Context The Internet, a network of networks Relationships between ASes 2.

More information

Understanding BGP Behavior through a Study of DoD Prefixes Λ

Understanding BGP Behavior through a Study of DoD Prefixes Λ Understanding BGP Behavior through a Study of DoD Prefixes Λ Xiaoliang Zhao, Dan Massey y USC/ISI S. Felix Wu z UC Davis Mohit Lad, Dan Pei, Lan Wang, Lixia Zhang x UCLA Abstract BGP is the de-facto inter-domain

More information

On characterizing BGP routing table growth

On characterizing BGP routing table growth University of Massachusetts Amherst From the SelectedWorks of Lixin Gao 00 On characterizing BGP routing table growth T Bu LX Gao D Towsley Available at: https://works.bepress.com/lixin_gao/66/ On Characterizing

More information

Simulating Internet Scale Topologies with Metarouting

Simulating Internet Scale Topologies with Metarouting Computer Science Technical Report Simulating Internet Scale Topologies with Metarouting Steve DiBenedetto, Andrew Stone, Michelle Strout, Dan Massey Department of Computer Science Colorado State University

More information

Understanding Opera.onal Rou.ng (part II) Geoffrey Xie Naval Postgraduate School

Understanding Opera.onal Rou.ng (part II) Geoffrey Xie Naval Postgraduate School Understanding Opera.onal Rou.ng (part II) Geoffrey Xie Naval Postgraduate School July 6, 2011 Route Aggrega.on Child Route Unallocated Child Prefix: e.g., 10.1.33.0/24 19.1.1.2 Aggregate Route 10.1.1.0/24

More information

Combining Ac5ve Route Measurements with Passive BGP Data

Combining Ac5ve Route Measurements with Passive BGP Data Combining Ac5ve Route Measurements with Passive BGP Data Dan Massey Maka ala Networks/Colorado State Joe Gersch Cathie Olshanowsky Secure64 SW Corp Colorado State University John Kemp RouteViews/University

More information

Quantifying Path Exploration in the Internet

Quantifying Path Exploration in the Internet IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 2, APRIL 2009 445 Quantifying Path Exploration in the Internet Ricardo Oliveira, Member, IEEE, Beichuan Zhang, Dan Pei, and Lixia Zhang Abstract Previous

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 3035/GZ01 4 th December 2014 Outline Context: Inter-Domain Routing

More information

New World BGP. Geoff Huston January2010 APNIC

New World BGP. Geoff Huston January2010 APNIC New World BGP Geoff Huston January2010 APNIC 16- bit AS Number Map 16- bit AS Number Map Unadvertised AS Numbers RIR Pool AS Numbers Advertised AS Numbers IANA Pool 16- bit AS Number Map Unadvertised AS

More information

Prop-083v003. Alterna(ve criteria for subsequent IPv6 alloca(ons. APNIC 31, Hong Kong. Skeeve Stevens

Prop-083v003. Alterna(ve criteria for subsequent IPv6 alloca(ons. APNIC 31, Hong Kong. Skeeve Stevens Prop-083v003 Alterna(ve criteria for subsequent IPv6 alloca(ons Skeeve Stevens APNIC 31, Hong Kong Introduc(on This is a proposal to enable current APNIC account holders with exis9ng IPv6 alloca9ons to

More information

The Spoofer Project Inferring the Extent of Source Address Filtering on the Internet

The Spoofer Project Inferring the Extent of Source Address Filtering on the Internet The Spoofer Project Inferring the Extent of Source Address Filtering on the Internet Rob Beverly and Steve Bauer {rbeverly,bauer}@mit.edu The Spoofer Project Goal: Quantify the extent and nature of source

More information

PHAS: A Prefix Hijack Alert System

PHAS: A Prefix Hijack Alert System PHAS: A Prefix Hijack Alert System Mohit Lad mohit@cs.ucla.edu Yiguo Wu yiguowu@cs.ucla.edu Dan Massey massey@cs.colostate.edu Beichuan Zhang bzhang@cs.arizona.edu Dan Pei peidan@research.att.com Lixia

More information

Quantifying Path Exploration in the Internet

Quantifying Path Exploration in the Internet Quantifying Path Exploration in the Internet Ricardo Oliveira Beichuan Zhang Dan Pei Lixia Zhang {rveloso,lixia}@cs.ucla.edu bzhang@cs.arizona.edu peidan@research.att.com University of California, Los

More information

Other Developments: CIDR

Other Developments: CIDR Other Developments: CIDR CIDR (classless Inter domain routing) Too many small networks requiring multiple class C addresses Running out of class B addresses, not enough nets in class A Assign contiguous

More information

CSE 461 Interdomain routing. David Wetherall

CSE 461 Interdomain routing. David Wetherall CSE 461 Interdomain routing David Wetherall djw@cs.washington.edu Interdomain routing Focus: Routing across internetworks made up of different parties Route scaling Application Route policy Transport The

More information

BGPMON.IO: THE MANY NEW FACES OF BGPMON

BGPMON.IO: THE MANY NEW FACES OF BGPMON BGPMON.IO: THE MANY NEW FACES OF BGPMON Colorado State University Spiros Thanasoulas and Christos Papadopoulos NANOG 69, Feb 6-8 2017, Washington DC Work supported by NSF #CNS1305404, DHS #D15PC00205,

More information

An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications

An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications Zhenhai Duan, Kartik Gopalan, Xin Yuan Abstract In this paper we present a detailed study of the behavioral characteristics

More information

EECS 122, Lecture 17. The Distributed Update Algorithm (DUAL) Optimization Criteria. DUAL Data Structures. Selecting Among Neighbors.

EECS 122, Lecture 17. The Distributed Update Algorithm (DUAL) Optimization Criteria. DUAL Data Structures. Selecting Among Neighbors. EECS 122, Lecture 17 Kevin Fall kfall@cs.berkeley.edu edu The Distributed Update Algorithm (DUAL) J.J. Garcia-Luna Luna-Aceves [SIGCOMM 89] Aims at removing transient loops in both DV and LS routing protocols

More information

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

CS 43: Computer Networks. 24: Internet Routing November 19, 2018 CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small

More information

BGP Configuration for a Transit ISP

BGP Configuration for a Transit ISP BGP Configuration for a Transit ISP ISP Workshops Last updated 24 April 2013 1 Definitions p Transit carrying traffic across a network, usually for a fee n traffic and prefixes originating from one AS

More information

BGP Inbound Optimization Using Performance Routing

BGP Inbound Optimization Using Performance Routing BGP Inbound Optimization Using Performance Routing The PfR BGP Inbound Optimization feature introduced support for the best entrance selection for traffic that originates from prefixes outside an autonomous

More information

Measurement of Highly Active Prefixes in BGP

Measurement of Highly Active Prefixes in BGP 1 Measurement of Highly Active Prefixes in BGP Ricardo V. Oliveira, Rafit Izhak-Ratzin, Beichuan Zhang, Lixia Zhang Abstract We conduct a systematic study on the pervasiveness and persistency of one specific

More information

Internet Measurements. Motivation

Internet Measurements. Motivation Internet Measurements Arvind Krishnamurthy Fall 2004 Motivation Types of measurements Understand the topology of the Internet Measure performance characteristics Tools: BGP Tables Traceroute measurements

More information

The BGP Visibility Scanner

The BGP Visibility Scanner The BGP Visibility Scanner Andra Lutu 1,2, Marcelo Bagnulo 2 and Olaf Maennel 3 Institute IMDEA Networks 1, University Carlos III Madrid 2, Loughborough University 3 Problem Statement The routing preferences

More information

Inferring Autonomous System Relationships in the Internet. Lixin Gao

Inferring Autonomous System Relationships in the Internet. Lixin Gao Inferring Autonomous System Relationships in the Internet Lixin Gao Motivation Routing policies are constrained by the contractual commercial agreements between administrative domains For example: AS sets

More information

On the Impact of Filters on Analyzing Prefix Reachability in the Internet. Ravish Khosla, Sonia Fahmy, Y. Charlie Hu Purdue University ICCCN 2009

On the Impact of Filters on Analyzing Prefix Reachability in the Internet. Ravish Khosla, Sonia Fahmy, Y. Charlie Hu Purdue University ICCCN 2009 On the Impact of Filters on Analyzing Prefix Reachability in the Internet Ravish Khosla, Sonia Fahmy, Y. Charlie Hu Purdue University ICCCN 2009 Background Border Gateway Protocol (BGP) Inter-domain policy

More information

APT: A Practical Transit-Mapping Service Overview and Comparisons

APT: A Practical Transit-Mapping Service Overview and Comparisons APT: A Practical Transit-Mapping Service Overview and Comparisons draft-jen-apt Dan Jen, Michael Meisel, Dan Massey, Lan Wang, Beichuan Zhang, and Lixia Zhang The Big Picture APT is similar to LISP at

More information

Quantifying Path Exploration in the Internet

Quantifying Path Exploration in the Internet Quantifying Path Exploration in the Internet Ricardo Oliveira rveloso@cs.ucla.edu Beichuan Zhang bzhang@cs.arizona.edu Rafit Izhak-Ratzin rafiti@cs.ucla.edu Lixia Zhang lixia@cs.ucla.edu Dan Pei peidan@research.att.com

More information

Lecture 19: Network Layer Routing in the Internet

Lecture 19: Network Layer Routing in the Internet Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F

More information

Identifying BGP Routing Table Transfer. !Machu Picchu!

Identifying BGP Routing Table Transfer. !Machu Picchu! Identifying BGP Routing Table Transfer Beichuan Zhang (Univ. Of Arizona) Vamsi Kambhampati (Colorado State Univ.) Daniel Massey (Colorado State Univ.) Mohit Lad (Univ. Of California, LA) Lixia Zhang (Univ.

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz 2

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz 2 Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.033 Computer Systems Engineering: Spring 2011 Quiz 2 There are 11 questions and 8 pages in this quiz booklet.

More information

The BGP Visibility Scanner

The BGP Visibility Scanner The BGP Visibility Scanner Andra Lutu 1,2, Marcelo Bagnulo 2 and Olaf Maennel 3 Institute IMDEA Networks 1, University Carlos III Madrid 2, Loughborough University 3 Problem Statement } The routing preferences

More information

CS519: Computer Networks. Lecture 4, Part 5: Mar 1, 2004 Internet Routing:

CS519: Computer Networks. Lecture 4, Part 5: Mar 1, 2004 Internet Routing: : Computer Networks Lecture 4, Part 5: Mar 1, 2004 Internet Routing: AS s, igp, and BGP As we said earlier, the Internet is composed of Autonomous Systems (ASs) Where each AS is a set of routers, links,

More information

AS-CRED: Reputation Service for Trustworthy Inter-domain Routing

AS-CRED: Reputation Service for Trustworthy Inter-domain Routing AS-CRED: Reputation Service for Trustworthy Inter-domain Routing Krishna Venkatasubramanian Computer and Information Science University of Pennsylvania ONR MURI N00014-07-1-0907 Review Meeting June 10,

More information

Studying Black Holes on the Internet with Hubble

Studying Black Holes on the Internet with Hubble Studying Black Holes on the Internet with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson University of Washington RIPE, May 2008 This

More information

CS 557 Internet Routing Policies

CS 557 Internet Routing Policies CS 557 Internet Routing Policies On Inferring and Characterizing Internet Routing Policies Feng Wang and Lixin Gao, 2003 Spring 2013 Characterizing Routing Policies Objective: Infer and characterize BGP

More information

Achieving Sub-50 Milliseconds Recovery Upon BGP Peering Link Failures

Achieving Sub-50 Milliseconds Recovery Upon BGP Peering Link Failures 1 Achieving Sub-50 Milliseconds Recovery Upon BGP Peering Link Failures Olivier Bonaventure, Clarence Filsfils and Pierre Francois Abstract Recent measurements show that BGP peering links can fail as frequently

More information

Flooding Attacks by Exploiting Persistent Forwarding Loops

Flooding Attacks by Exploiting Persistent Forwarding Loops Flooding Attacks by Exploiting Persistent Forwarding Jianhong Xia, Lixin Gao, Teng Fei University of Massachusetts at Amherst {jxia, lgao, tfei}@ecs.umass.edu ABSTRACT In this paper, we present flooding

More information

Testing the reachability of (new) address space

Testing the reachability of (new) address space Testing the reachability of (new) address space Steve Uhlig Delft University of Technology Randy Bush Internet Initiative Japan (IIJ) James Hiebert National Oceanic and Atmospheric Administration Olaf

More information

RPKI and Internet Routing Security ~ The regional ISP operator view ~

RPKI and Internet Routing Security ~ The regional ISP operator view ~ RPKI and Internet Routing Security ~ The regional ISP operator view ~ APNIC 29/APRICOT 2010 NEC BIGLOBE, Ltd. (AS2518) Seiichi Kawamura 1 Agenda Routing practices of the regional ISP today How this may

More information

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:

More information

CS 268: Computer Networking. Next Lecture: Interdomain Routing

CS 268: Computer Networking. Next Lecture: Interdomain Routing CS 268: Computer Networking L-3 BGP Next Lecture: Interdomain Routing BGP Assigned Reading MIT BGP Class Notes [Gao00] On Inferring Autonomous System Relationships in the Internet 2 Outline Need for hierarchical

More information

Next Lecture: Interdomain Routing : Computer Networking. Outline. Routing Hierarchies BGP

Next Lecture: Interdomain Routing : Computer Networking. Outline. Routing Hierarchies BGP Next Lecture: Interdomain Routing BGP 15-744: Computer Networking L-3 BGP Assigned Reading MIT BGP Class Notes [Gao00] On Inferring Autonomous System Relationships in the Internet Ooops 2 Outline Need

More information

CS 557 BGP Convergence

CS 557 BGP Convergence CS 557 BGP Convergence Improved BGP Convergence via Ghost Flushing Bremler-Barr, fek, Schwarz, 2003 BGP-RCN: Improving Convergence Through Root Cause Notification Pei, zuma, Massey, Zhang, 2005 Spring

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 15 Spring 2012 March 19, 2012 Announcements HW7 due this week HW8 due 3/28 Exam 2 on 4/23 HW7 RIP (Rou)ng Informa)on Protocol) Components Forwarding Rou)ng

More information

RouteViews + BGPmon Enabling BGP Monitoring and Analysis. Catherine Olschanowsky Lawrence Weikum John Kemp

RouteViews + BGPmon Enabling BGP Monitoring and Analysis. Catherine Olschanowsky Lawrence Weikum John Kemp RouteViews + BGPmon Enabling BGP Monitoring and Analysis Catherine Olschanowsky Lawrence Weikum John Kemp RouteViews + BGPmon: A Community Infrastructure Started by the opera

More information

Preventing the unnecessary propagation of BGP withdraws

Preventing the unnecessary propagation of BGP withdraws Preventing the unnecessary propagation of BGP withdraws V. Van den Schrieck, P. François, C. Pelsser, O.Bonaventure http://inl.info.ucl.ac.be Networking 2009, May 13th Agenda Introduction Presentation

More information

Assessing IPv6 Adop/on. Michael Bailey, University of Michigan NANOG 57

Assessing IPv6 Adop/on. Michael Bailey, University of Michigan NANOG 57 Assessing IPv6 Adop/on Michael Bailey, University of Michigan NANOG 57 Collaborators Mark Allman, Interna>onal Comp. Sci. Ins>tute Jakub Czyz, University of Michigan ScoG Iekel- Johnson, Arbor Networks

More information

BGP Convergence in Virtual Private Networks

BGP Convergence in Virtual Private Networks BGP Convergence in Virtual Private Networks Dan Pei Jacobus Van der Merwe AT&T Labs Research {peidan,kobus}@research.att.com Abstract Multi-protocol label switching (MPLS) virtual private networks (VPNs)

More information

Routing on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP

Routing on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP Routing on the Internet Computer Networks Lecture 17: Inter-domain Routing and BGP In the beginning there was the ARPANET: route using GGP (Gateway-to-Gateway Protocol), a distance vector routing protocol

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

Detection of Invalid Routing Announcement in the Internet Λ

Detection of Invalid Routing Announcement in the Internet Λ Detection of Invalid Routing Announcement in the Internet Λ Xiaoliang Zhao, Dan Pei, Lan Wang, Dan Massey, Allison Mankin, S. Felix Wu,Lixia Zhang y Abstract Network measurement has shown that a specific

More information

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage

Lecture 16: Interdomain Routing. CSE 123: Computer Networks Stefan Savage Lecture 16: Interdomain Routing CSE 123: Computer Networks Stefan Savage Overview Autonomous Systems Each network on the Internet has its own goals Path-vector Routing Allows scalable, informed route selection

More information

An Analysis of Convergence Delay in Path-Vector Routing Protocols

An Analysis of Convergence Delay in Path-Vector Routing Protocols An Analysis of Convergence Delay in Path-Vector Routing Protocols Dan Pei 1, Beichuan Zhang 1 Daniel Massey 2 Lixia Zhang 1 Abstract Path vector routing protocols such as BGP are known to suffer from slow

More information

IPv6 Pollution Traffic Analysis

IPv6 Pollution Traffic Analysis IPv6 Pollution Traffic Analysis Manish Karir (DHS S&T Cyber Security Division) Jake Czyz, Kyle Lady, Sam Miller, Michael Kallitsis, Michael Bailey (University of Michigan) Internet Pollu+on Darknet sensors

More information

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times On the Impact of Route Processing and MRAI Timers on BGP Convergence Times Shivani Deshpande and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute, Troy, NY 12180 Abstract Fast convergence

More information

A novel design for maximum use of public IP Space by ISPs one IP per customer

A novel design for maximum use of public IP Space by ISPs one IP per customer A novel design for maximum use of public IP Space by ISPs one IP per customer 6/20/2018 Jim McNally, James Lopeman Plusten Mark Steckel Citywisper Abstract This paper outlines a new design for ISP networks

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 16, 2017 1 Hierarchical routing Our routing study thus far - idealization all routers identical network flat not true in

More information

Timer Interaction in Route Flap Damping

Timer Interaction in Route Flap Damping Timer Interaction in Route Flap Damping Beichuan Zhang, Dan Pei, Lixia Zhang #UCLA$ Daniel Massey #Colorado State$ June, 2005 1 This Talk Route Flap Damping is a key mechanism in BGP to maintain global

More information

On the Characteristics of BGP Multiple Origin AS Conflicts

On the Characteristics of BGP Multiple Origin AS Conflicts 1 On the Characteristics of BGP Multiple Origin AS Conflicts Kwan-Wu Chin School of Electrical, Computer and Telecommunications Engineering University of Wollongong Northfields Avenue, NSW, Australia kwanwu@uow.edu.au

More information

Module 18 Transit. Objective: To investigate methods for providing transit services. Prerequisites: Modules 12 and 13, and the Transit Presentation

Module 18 Transit. Objective: To investigate methods for providing transit services. Prerequisites: Modules 12 and 13, and the Transit Presentation ISP/IXP Networking Workshop Lab Module 18 Transit Objective: To investigate methods for providing transit services. Prerequisites: Modules 12 and 13, and the Transit Presentation The following will be

More information

The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery

The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery Evan Cooke *, Michael Bailey *, Farnam Jahanian *, Richard Mortier *University of Michigan Microsoft Research - 1 - NSDI 2006

More information

Backbone Networks. Networking Case Studies. Backbone Networks. Backbone Topology. Mike Freedman COS 461: Computer Networks.

Backbone Networks. Networking Case Studies. Backbone Networks. Backbone Topology. Mike Freedman COS 461: Computer Networks. Networking Case Studies Datacenter Backbone Networks Enterprise Backbone Mike Freedman COS 6: Computer Networks Cellular h>p://www.cs.princeton.edu/courses/archive/spr/cos6/ Wireless Backbone Networks

More information

Data-Driven Network Opera1ons. France-IX 2016 Avi Freedman

Data-Driven Network Opera1ons. France-IX 2016 Avi Freedman Data-Driven Network Opera1ons France-IX 2016 Avi Freedman Summary Why Data-Driven Network Opera1ons? The food: data types and sources Requirements and tool types Data Fusion Business-driven use cases:

More information

Investigating occurrence of duplicate updates in BGP announcements

Investigating occurrence of duplicate updates in BGP announcements Investigating occurrence of duplicate updates in BGP announcements Jong Han Park 1, Dan Jen 1, Mohit Lad 2, Shane Amante 3, Danny McPherson 4, and Lixia Zhang 1 1 University of California, Los Angeles

More information

By Aftab A. Siddiqui Cyber Internet Services (Pvt.) Ltd IPv6 Task Force Pakistan

By Aftab A. Siddiqui Cyber Internet Services (Pvt.) Ltd IPv6 Task Force Pakistan By Aftab A. Siddiqui Cyber Internet Services (Pvt.) Ltd IPv6 Task Force Pakistan Introduction IPv6 delegation in Pakistan Pakistan s IPv6 prefixes visibility IPv6 Task Force Introduction Pakistan v6core

More information

PART III. Implementing Inter-Network Relationships with BGP

PART III. Implementing Inter-Network Relationships with BGP PART III Implementing Inter-Network Relationships with BGP ICNP 2002 Routing Protocols Autonomous System BGP-4 BGP = Border Gateway Protocol Is a Policy-Based routing protocol Is the de facto EGP of today

More information

E : Internet Routing

E : Internet Routing E6998-02: Internet Routing Lecture 16 Border Gateway Protocol, Part V John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 14, 2013 1 Reading Quiz Hierarchical routing Our routing study thus far - idealization all routers identical network flat

More information

Understanding IPv6 Internet Background Radia6on

Understanding IPv6 Internet Background Radia6on Understanding IPv6 Internet Background Radia6on Jakub Czyz*, Kyle Lady*, Sam Miller*, Michael Kallitsis, Manish Karir, Michael Bailey* *University of Michigan Merit Network Dept. of Homeland Security S&T

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

Detecting inconsistencies in INRDB data

Detecting inconsistencies in INRDB data Detecting inconsistencies in INRDB data to identify MOAS cases and possible illegitimate Internet resource usage Peter Ruissen System and Network Engineering University of Amsterdam December 11, 2007 1

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Inter-Domain Routing Internet is a network of networks Hierarchy

More information

Route Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes

Route Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes Internal prefixes originated in IP core network Loopback Transport Connect inter-regional

More information

Practical Verification Techniques for Wide-Area Routing

Practical Verification Techniques for Wide-Area Routing Practical Verification Techniques for Wide-Area Routing Nick Feamster M.I.T. Computer Science and Artificial Intelligence Laboratory feamster@lcs.mit.edu http://nms.lcs.mit.edu/bgp/ (Thanks to Hari Balakrishnan

More information

Module 1b IS-IS. Prerequisites: The setup section of Module 1. The following will be the common topology used for the first series of labs.

Module 1b IS-IS. Prerequisites: The setup section of Module 1. The following will be the common topology used for the first series of labs. Module 1b IS-IS Objective: Create a basic physical lab interconnection with one IS-IS Area. Ensure that all routers, interfaces, cables and connections are working properly. Prerequisites: The setup section

More information

IPv6 deployment status: Where are we now and way forward. Miwa Fujii APNIC

IPv6 deployment status: Where are we now and way forward. Miwa Fujii APNIC IPv6 deployment status: Where are we now and way forward Miwa Fujii APNIC Table of contents Dissecting IPv6 adoption IPv6 deployment status in the AP region Way forward 2 Dissecting IPv6

More information

Active BGP Measurement with BGP-Mux. Ethan Katz-Bassett (USC) with testbed and some slides hijacked from Nick Feamster and Valas Valancius

Active BGP Measurement with BGP-Mux. Ethan Katz-Bassett (USC) with testbed and some slides hijacked from Nick Feamster and Valas Valancius Active BGP Measurement with BGP-Mux Ethan Katz-Bassett (USC) with testbed and some slides hijacked from Nick Feamster and Valas Valancius 2 Before I Start Georgia Tech system, I am just an enthusiastic

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Comparing IPv4 and IPv6 from the perspec7ve of BGP dynamic ac7vity. Geoff Huston APNIC February 2012

Comparing IPv4 and IPv6 from the perspec7ve of BGP dynamic ac7vity. Geoff Huston APNIC February 2012 Comparing IPv4 and IPv6 from the perspec7ve of BGP dynamic ac7vity Geoff Huston APNIC February 2012 The IPv4 Table: 2004 - now The IPv6 Table: 2004 - now AS131072 BGP Updates / day V4 - ~100K updates/day

More information

An Analysis of ARIN NetHandles with OriginAS i Data and Analysis of RIR/IRR Registry Data

An Analysis of ARIN NetHandles with OriginAS i Data and Analysis of RIR/IRR Registry Data Network king Progr ram Trus stworthy An Analysis of ARIN NetHandles with OriginAS i Data and Analysis of RIR/IRR Registry Data O. Kim, K. Sriram, O. Borchert, P. Gleichmann, and D. Montgomery Presentation

More information

Analysis of Routing Characteristics in the Multicast Infrastructure

Analysis of Routing Characteristics in the Multicast Infrastructure Analysis of Routing Characteristics in the Multicast Infrastructure Prashant Rajvaidya and Kevin C. Almeroth Department of Computer Science University of California Santa Barbara Santa Barbara, CA 9316-511

More information

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics:

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics: Network Forensics: Network OS Fingerprinting Prefix Hijacking Analysis Scott Hand September 30 th, 2011 Outline 1 Network Forensics Introduction OS Fingerprinting 2 Prefix Hijacking Theory BGP Background

More information

ICANN Start -Ep 05 Page 1 of 11. ICANN Start, Episode 5: What Does IPv6 Mean?

ICANN Start -Ep 05 Page 1 of 11. ICANN Start, Episode 5: What Does IPv6 Mean? ICANN Start -Ep 05 Page 1 of 11 Released 29 April, 2010 ICANN Start, Episode 5: What Does IPv6 Mean? Imagine you re at a technology conference, and they planned for 500 attendees, but 800 showed up. The

More information

COMP/ELEC 429 Introduction to Computer Networks

COMP/ELEC 429 Introduction to Computer Networks COMP/ELEC 429 Introduction to Computer Networks Lecture 11: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at

More information

GUI Representation of Cisco IOS CLI Commands

GUI Representation of Cisco IOS CLI Commands CHAPTER 2 This chapter shows examples of how some functions common to both the Cisco IOS version of Cisco OER and the Cisco OER Master Controller Engine are represented in CLI commands and the GUI, which

More information

ECE 428 Internet Protocols (Network Layer: Layer 3)

ECE 428 Internet Protocols (Network Layer: Layer 3) ECE 428 Internet Protocols (Network Layer: Layer 3) 1 Done so far MAC protocols (with PHYsical layer) Transport bits from one node to another. Key element: Determine WHEN to transmit DLC protocol (running

More information

Homework Assignment #3b Due 11/22 at 3:50pm EE122 Fall 2010

Homework Assignment #3b Due 11/22 at 3:50pm EE122 Fall 2010 Homework Assignment #3b Due 11/22 at 3:50pm EE122 Fall 2010 Please submit your solutions using BSpace (https://bspace.berkeley.edu/). Log in to BSpace with your CalNet ID, click on the EL ENG 122 Fa10

More information

Multi-Lateral Peering Agreement

Multi-Lateral Peering Agreement Version 1.1 July 10, 2002 Multi-Lateral Peering Agreement Parties Definitions Obligations Rules Rights Exclusions Best effort basis Establishment procedure Term and renewal Change procedure Termination

More information

A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance

A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance Feng Wang University of Mass., Amherst fewang@ecs.umass.edu Zhuoqing Morley Mao University of Michigan zmao@eecs.umich.edu

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 12: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

Persistent Detection and Recovery of State Inconsistencies

Persistent Detection and Recovery of State Inconsistencies Persistent Detection and Recovery of State Inconsistencies Lan Wang, Daniel Massey, Lixia Zhang University of Memphis, Computer Science Department, Memphis, TN 38152 Colorado State University, Computer

More information

Routing on the Internet! Hierarchical Routing! The NSFNet 1989! Aggregate routers into regions of autonomous systems (AS)!

Routing on the Internet! Hierarchical Routing! The NSFNet 1989! Aggregate routers into regions of autonomous systems (AS)! Routing on the Internet! Hierarchical Routing! Aggregate routers into regions of autonomous systems (AS)! In the beginning there was the ARPANET:! route using GGP (Gateway-to-Gateway Protocol)," a distance

More information